• No results found

Mitigate the Energy Consumption In Dynamic Wireless Sensor Networks Using Mathematical Model

N/A
N/A
Protected

Academic year: 2020

Share "Mitigate the Energy Consumption In Dynamic Wireless Sensor Networks Using Mathematical Model"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 3967

Mitigate the Energy Consumption In Dynamic Wireless Sensor

Networks Using Mathematical Model

K Rakesh

Assistant professor Department of Electronics and Communication Engineering

Joginpally BR Engineering College, Hyderabad, Telangana, India.

ABSTRACT:

Wireless sensor networks (WSNs) have been deployed for a wide type of packages, including navy sensing and monitoring, patient fame tracking, visitors float monitoring, where sensory gadgets regularly pass between

exclusive places. Securing facts and

communications requires appropriate

encryption key protocols. In this paper, we use a certificates much less-effective key control (CL-EKM) protocol for at ease communication in dynamic WSNs characterised by means of node mobility. The CL-EKM helps efficient key updates when a node leaves or joins a cluster and guarantees forward and backward key secrecy. The protocol additionally supports efficient key revocation for compromised nodes and minimizes the effect of a node

compromise on the safety of other conversation hyperlinks. A safety evaluation of our scheme shows that our protocol is effective in defending in opposition to various attacks. In this paper, we layout mathematical model for mitigating the power intake. We put in force CL-EKM with mathematical technique using NS-2 simulator to

assess its time, power, verbal exchange, and reminiscence overall performance.

INTRODUCTION:

DYNAMIC wireless sensor networks (WSNs), which enable mobility of sensor nodes, facilitate wider community coverage and more correct service than static WSNs. Therefore, dynamic WSNs are being unexpectedly adopted in tracking packages, inclusive of target tracking in battlefield surveillance, healthcare systems, site visitors float and automobile repute monitoring, dairy farm animals fitness monitoring. However, sensor gadgets are prone to malicious attacks such as impersonation, interception, seize or bodily destruction, due to their unattended

operative environments and lapses of

connectivity in wireless conversation. Thus, security is one of the most critical problems in lots of important dynamic WSN packages. Dynamic WSNs therefore want to address key

safety requirements, inclusive of node

(2)

Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 3968

form of encryption is well-proper for sensor nodes due to their limited power and processing functionality. However, it suffers from excessive communique overhead and requires big reminiscence space to save shared pairwise keys. It is likewise no longer scalable and now not resilient against compromises, and not able to aid node mobility. Therefore symmetric key encryption is not suitable for dynamic WSNs. More lately, asymmetric key based strategies have been proposed for dynamic WSNs.

EXISTING SYSTEM:

In this paper, we use a Certificate much less Key Management scheme (CL-EKM) that helps the establishment of 4 types of keys, namely: a certificate much less public/private key pair, an individual key, a pair clever key, and a cluster key. This scheme additionally utilizes the principle algorithms of the CL-HSC scheme in deriving certificate less public/non-public keys and pair smart keys. We briefly describe the essential notations used in the paper (See Table I), the reason of these keys and the way they may be setup.

• Certificate less Public/Private Key: Before a node is deployed, the KGC at the BS generates a completely unique certificate much less non-public/public key pair and installs the keys in the

node. This key pair is used to generate a jointly authenticated pair sensible key.

• Individual Node Key: Each node shares a unique man or woman key with BS. For example, a L-sensor can use the man or woman key to encrypt an alert message despatched to the BS, or if it fails to talk with the H-sensor. An H-sensor can use its person key to encrypt the message corresponding to changes inside the cluster. The BS also can use this key to encrypt any touchy facts, including compromised node data or commands. Before a node is deployed, the BS assigns the node the

individual key.

(3)

Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 3969

certificates much less public/non-public key pairs.

• Cluster Key: All nodes in a cluster percentage a key, named as cluster key. The cluster secret's specifically used for securing broadcast messages in a cluster, e.G., touchy commands or the alternate of member status in a cluster. Only the cluster head can replace the cluster key when a L-sensor

leaves or joins the cluster.

DISADVANTAGES:

a)Key generation no longer in comfortable way b)Energy stages less

c)Individual energy for node now not calculated

PROPOSED SYSTEM:

We propose a mathematical model for electricity intake. It approach that calculating the electricity for individual nodes and reduce the strength consumption for a secure way. Here the back down and keep values for node technology.

ADVANTAGES:

• Energy degrees are extra

• Individual node performance

calculated

• Energy consumption less

• Secure extra

Effective key management dynamic WSNs

(4)

Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 3970

CONCLUSION:

In this paper, we endorse the first certificates less effective key control protocol (CL-EKM) for secure conversation in dynamic WSNs. CL-EKM helps efficient conversation for key updates and control whilst a node leaves or joins a cluster and consequently guarantees ahead and backward key secrecy. Our scheme is resilient towards node compromise, cloning and impersonation assaults and protects the statistics confidentiality and integrity. The experimental outcomes reveal the efficiency of CL-EKM in useful resource confined WSNs. We recommend a mathematical model for power intake, based totally on CL-EKM with numerous parameters related to node actions. This mathematical model could be utilized to estimate the right cost for the Thold and Tbackof f parameters based totally on the velocity and the preferred tradeoff between the power consumption and the safety degree.

REFERENCES:

[1] H. Chan, A. Perrig, and D. Song,

“Random key predistribution schemes

[2] for sensor networks,” in Proc. IEEE

Symp. SP, May 2003, pp. 197–213.

[3] W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A key predistribution

[4] scheme for sensor networks using

deployment knowledge,” IEEE Trans.

[5] Dependable Secure Comput., vol. 3, no.

1, pp. 62–77, Jan./Mar. 2006.

[6] W. Du, J. Deng, Y. S. Han, P. Varshney,

J. Katz, and A. Khalili,

[7] “A pairwise key predistribution scheme for wireless sensor networks,”

[8] ACM Trans. Inf. Syst. Secur., vol. 8, no.

2, pp. 228–258, 2005.

[9] M. Rahman and K. El-Khatib, “Private key agreement and secure communication for heterogeneous sensor networks,” J. Parallel

Distrib.Comput., vol. 70, no. 8, pp. 858–870,

2010.

[10] M. R. Alagheband and M. R. Aref, “Dynamic and secure key management model for hierarchical heterogeneous sensor networks,” IET Inf.Secur., vol. 6, no. 4, pp. 271–280, Dec. 2012.

[11] D. S. Sanchez and H. Baldus, “A

deterministic pairwise key predistribution scheme for mobile sensor networks,” in Proc.

1st Int. Conf.SecureComm, Sep. 2005, pp. 277–

288.

Author Profile:

(5)

Available online: https://edupediapublications.org/journals/index.php/IJR/ P a g e | 3971

Department of Electronics and communication Engineering, Joginpally B.R Engineering

college, Moinabad, Rangareddy Dist,

Hyderabad, Telangana, India. He studied B.TECH (ECE) from J.B.R.E.C, JNTU

University, Hyderabad and

M.Tech(WIRELESS MOBILE

References

Related documents

Objectives: To asses the length of stay using Continuous Positive pressure ventilation (CPAP) during weaning in post bypass patients in cardiac ICU and compared this procedure with

This study therefore examines the differences in the perception of the three key characteristics of mobile marketing (relative advantage, compatibility, and complexity) across male

In this paper I would like to sintetize the main benefits of rapid prototyping used in the field of medicine and medical engineering, based on the close approach beetwen

Repmediated ex- change takes place in early embryos whose mothers are Rex and whose fathers contribute a target chromosome that bears two rDNA arrays.. Normally, a

Lodhi, “Developing Safety Culture in Pakistani construction industry – Site Safety Implementation and Safe ty Performance Improvement,” in 2nd International Conference

At the time of this writing there have been more than three dozen reported cases decided by federal courts in some way interpreting the anti-retaliation provisions of

The Protect Our Water and Health: Ban Fracking Initiative (“Initiative”), adopted by County voters, builds upon the provisions of this Chapter 19.21 (“this Chapter”) by

Nhaesi, Abdulghanni H., "An improved model for describing mass-transfer in bubble columns and three- phase fluidized beds." (1986).. Electronic Theses